US20210037591A1 - Apparatus and method for mobility management - Google Patents
Apparatus and method for mobility management Download PDFInfo
- Publication number
- US20210037591A1 US20210037591A1 US17/075,048 US202017075048A US2021037591A1 US 20210037591 A1 US20210037591 A1 US 20210037591A1 US 202017075048 A US202017075048 A US 202017075048A US 2021037591 A1 US2021037591 A1 US 2021037591A1
- Authority
- US
- United States
- Prior art keywords
- wireless communication
- communication node
- message
- node
- data packets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 140
- 238000004891 communication Methods 0.000 claims abstract description 206
- 230000005540 biological transmission Effects 0.000 claims abstract description 72
- 230000008859 change Effects 0.000 claims description 56
- 238000001514 detection method Methods 0.000 claims description 8
- 230000006835 compression Effects 0.000 claims description 7
- 238000007906 compression Methods 0.000 claims description 7
- 238000001228 spectrum Methods 0.000 abstract description 36
- 238000005516 engineering process Methods 0.000 description 28
- 238000011156 evaluation Methods 0.000 description 20
- 238000005259 measurement Methods 0.000 description 13
- 230000000694 effects Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 9
- 238000011084 recovery Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000012544 monitoring process Methods 0.000 description 6
- 230000015654 memory Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 101001055444 Homo sapiens Mediator of RNA polymerase II transcription subunit 20 Proteins 0.000 description 2
- 102100026165 Mediator of RNA polymerase II transcription subunit 20 Human genes 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 238000005265 energy consumption Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000013515 script Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000003595 spectral effect Effects 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/19—Connection re-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
- H04L5/0055—Physical resource allocation for ACK/NACK
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/02—Buffering or recovering information during reselection ; Modification of the traffic flow during hand-off
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/08—Reselecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0446—Resources in time domain, e.g. slots or frames
-
- H04W72/14—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
- H04W72/23—Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/08—Upper layer protocols
Definitions
- This patent document is directed generally to digital wireless communications.
- This document discloses methods, systems, and devices related to mobility management, e.g., reducing transmission delay and interference, and/or increasing transmission reliability, using the unlicensed spectrum.
- a method for wireless communication includes receiving, at a wireless communication node, a first message from a mobile device requesting a reestablishment of a network connection; transmitting, from the wireless communication node, a second message to the mobile device, the second message including information for reestablishing and reconfiguring the network connection; and receiving, at the wireless communication node, a third message from the mobile device acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- a method for wireless communication includes transmitting, from a mobile device, a first message to a wireless communication node requesting a reestablishment of a network connection; receiving, at the mobile device, a second message from the wireless communication node, the second message including information for reestablishing and reconfiguring the network connection; and transmitting, from the mobile device, a third message to the wireless communication node acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- a method for wireless communication includes transmitting, from a first wireless communication node over a first transmission link, a set of data packets to a mobile device during a handover or a change of node operation; and transmitting, from the first wireless communication node over a second transmission link, at least a subset of the set of data packets to a second wireless communication node during the handover or the change of node operation to cause the second wireless communication to send at least the subset of the set of data packets to the mobile device over a third transmission link.
- a wireless communication method includes receiving, at a mobile device, a set of data packets from a first wireless communication node over a first wireless link during a handover operation or a change of node operation; receiving, at the mobile device, at least a subset of the set of data packets from a second wireless communication node over a second wireless link during the handover operation or the change of node; and decoding the data packets based on the set of data packets from the first wireless communication node and at least the subset of the set of data packets from the second wireless communication node.
- a wireless communication method includes transmitting, from a mobile device, a set of data packets to a first wireless communication node during a handover operation or a change of node; and transmitting, from the mobile device, at least a subset of the set of the data packets to a second wireless communication node during the handover operation or the change of node operation for assisting the first wireless communication node to decode the data packets.
- a wireless communication method includes receiving, at a first wireless communication node, a set of data packets from a mobile device during a handover operation or a change of node operation; receiving, at the first wireless communication node over a second transmission link, at least a subset of the set of data packets from the second wireless communication node; and decoding, by the first wireless communication node, the data packets based on the set of the data packets from the mobile device and at least the subset of the set of data packets from the second wireless communication node.
- a wireless communication method includes monitoring, at a mobile device, a first number of failures of a network activity within a first evaluation period; determining, by the mobile device, based on the first number of failures of the network activity, a network problem caused by a network access using a contention-based protocol; and initiating, by the mobile device, a procedure to recover from the network problem or to report the network problem.
- a wireless communications apparatus comprising a processor.
- the processor is configured to implement a method described herein.
- the various techniques described herein may be embodied as processor-executable code and stored on a computer-readable program medium.
- FIG. 1 shows a representative deployment of a licensed and unlicensed spectrum that can be used in New Radio (NR) communication systems.
- NR New Radio
- FIG. 2 shows a Radio Resource Control (RRC) connection re-establishment procedure used in some of the current wireless communication systems.
- RRC Radio Resource Control
- FIG. 3 shows a representative re-establishment procedure in accordance with the disclosed technology.
- FIG. 4 is a flowchart representation of representative steps that a wireless communication node can take to generate a message in accordance with the disclosed technology.
- FIG. 5 is a flowchart representation of representative steps that a terminal can take to decode a message in accordance with the disclosed technology.
- FIG. 6 is a flowchart representation of a method for wireless communication in accordance with the disclosed technology.
- FIG. 7 is a flowchart representation of another method for wireless communication in accordance with the disclosed technology.
- FIG. 8 shows a schematic diagram of a data flow for a downlink transmission in accordance with the disclosed technology.
- FIG. 9A is a flowchart representation of a method for wireless communication.
- FIG. 9B is another flowchart representation of a method for wireless communication.
- FIG. 10 shows a schematic diagram of a data flow for an uplink transmission in accordance with the disclosed technology.
- FIG. 11A is a flowchart representation of a method for wireless communication in accordance with the disclosed technology.
- FIG. 11B is a flowchart representation of a method for wireless communication in accordance with the disclosed technology.
- FIG. 12 shows a schematic diagram of a representative TMD pattern in accordance with the disclosed technology.
- FIG. 13 shows an example of a wireless communication system where techniques in accordance with one or more embodiments of the present technology can be applied.
- FIG. 14 is a block diagram representation of a portion of a radio station.
- FIG. 15 is a flowchart representation of a method for wireless communication in accordance with the disclosed technology.
- NR 5G New Radio
- LAA Licensed-Assisted Access
- SCell Secondary Component Carrier
- PCell Primary Component Carrier
- LAA Licensed-Assisted Access
- the unlicensed spectrum needs to be tied to the licensed spectrum. This limits the deployment and flexible usage of the unlicensed spectrum.
- FIG. 1 shows a representative deployment of licensed and unlicensed spectrum that can be used in the NR communication systems.
- Node A ( 101 ) operating in the licensed spectrum can support seamless coverage.
- Node B ( 102 ) and Node C ( 103 ) operating in the unlicensed spectrum can be deployed in sub-regions, providing a subset of services or all the services for a terminal (also referred to as a mobile device or a user equipment).
- the terminal can access Node B or Node C directly.
- the terminal can access Node A directly as a master node, while Node B and Node C are functioning as secondary nodes.
- the terminals gain access to the unlicensed spectrum through a contention-based protocol (e.g., “Listen Before Talk” (LBT)).
- LBT Listen Before Talk
- different factors e.g., signal quality, preemption probability, and/or interference level
- LBT Listen Before Talk
- This document describes techniques that can be implemented in various embodiments to achieve efficient communications using the unlicensed spectrum.
- the techniques can be used in various scenarios (e.g., connection re-establishment, handovers, and/or change of node) to provide mobile devices with stable connections and to minimize communication issues due to delays.
- Some examples of the disclosed techniques are described in the following example embodiments.
- the unlicensed spectrum is more susceptible to interference.
- the contention-based protocol may cause the signals in the unlicensed spectrum to be less reliable.
- the signal quality can be particularly low.
- the serving cell, the neighboring cells, and the terminals may compete the common spectrum, causing serious interference. Therefore, for the terminals at the edge of a cell, radio link failure and Radio Resource Control (RRC) connection re-establishment procedure happens more frequently.
- RRC Radio Resource Control
- FIG. 2 shows an RRC connection re-establishment procedure used in some of the current wireless communication systems (e.g., Long Term Evolution (LTE) systems).
- LTE Long Term Evolution
- the terminal first transmits, at 201 , an RRCConnectionReestablishmentRequest message to the node.
- the node transmits, at 202 , an RRCConnectionReestablishment message in response to the previous message.
- the terminal transmits, at 203 , an RRCConnectionReestablishmentComplete message to indicate the reestablishment is completed.
- the node then transmits, at 204 , an RRCConnectionReconfiguration message to reconfigure the connection.
- the terminal transmits, at 205 , an RRCConnectionReconfigurationComplete to indicate the reconfiguration has completed.
- contention-based protocol e.g., LBT
- LBT contention-based protocol
- both the terminal and the node need to contend the medium for message transmissions.
- the current procedure would lead to five times of medium contention.
- the recovery procedure can be further delayed when transmission failures happen—retransmissions of messages also require contention-based access. Therefore, the current procedure is not suitable for efficient connection re-establishment in the unlicensed spectrum.
- FIG. 3 shows a representative re-establishment procedure in accordance with the disclosed technology.
- the terminal first transmits, at 301 , an RRCConnectionReestablishmentRequest message to the node.
- the node then, at 302 , transmits a message that includes information for both the RRCConnectionReestablishment and the RRCConnectionReconfiguration.
- the RRCConnectionReconfiguration message can be embedded into the RRCConnectionReestablishment message.
- the RRCConnectionReestablishment message can carry a Protocol Data Unit (PDU) packet or octet string that includes the RRCConnectionReconfiguration message.
- PDU Protocol Data Unit
- the terminal can transmit, at 303 and 303 ′, both the RRCConnectionReestablishmentComplete message and the RRCConnectionReconfigurationComplete message.
- the terminal can transmit, at 303 ′, a single RRCConnectionReconfigurationComplete message to indicate that both the reestablishment and reconfiguration are successful.
- RRC connection reconfiguration fails, the terminal can transmit, at 303 , the RRCConnectionReestablishmentComplete message, and/or initiate the connection the re-establishment procedure. If RRC Connection Reestablishment fails, the terminal can perform actions upon leaving the RRC_CONNECTED state.
- the node when the node receives the RRCConnectionReconfigurationComplete message, it can determine that both reestablishment and reconfiguration are successful. If it only receives the RRCConnectionReestablishmentComplete message, it can determine that the RRCConnectionReestablishment procedure completes and perform the RRCConnectionReconfiguration procedure again.
- the number of message transmission required for the connection recovery process can be reduced to three when both the reestablishment and reconfiguration are successful, thereby reducing the amount of time required to complete the recovery using a contention-based protocol in unlicensed medium.
- FIG. 4 is a flowchart representation of representative steps that a wireless communication node can take in the RRC entity and the Packet Data Convergence Protocol (PDCP) entity to generate an RRCConnectionReestablishment message in accordance with the disclosed technology.
- PDCP Packet Data Convergence Protocol
- Step 401 The node receives a RRCConnectionReestablishmentRequest message from the terminal.
- Step 402 The RRC entity of the node generates configuration parameter for Signaling Radio Bear 1 (SRB1) and sets the content of the RRCConnectionReestablishment message.
- SRB1 Signaling Radio Bear 1
- Step 403 The RRC entity also generates configuration parameters for SRB2 and Data Radio Bearer (DRB), and sets the content of RRCConnectionReconfiguration message.
- DRB Data Radio Bearer
- Step 404 The RRC entity submits the RRCConnectionReconfiguration message to the PDCP entity for processing.
- Step 405 The PDCP entity processes the message according to the reconfigured SRB1 and produce a corresponding PDCP PDU.
- Step 406 The PDCP entity delivers the PDCP PDU to the RRC entity.
- Step 407 The RRC entity embeds the Service Data Unit (SDU) into the RRCConnectionReestablishment message.
- SDU Service Data Unit
- Step 408 The RRC entity submits the RRCConnectionReestablishment message to lower layers for transmission according to the SRB0.
- FIG. 5 is a flowchart representation of representative steps that a terminal can take in the RRC entity and the PDCP entity to decode the RRCConnectionReestablishment message in accordance with the disclosed technology.
- Step 501 The terminal receives an RRCConnectionReestablishment message.
- Step 502 The terminal resumes SRB1 and reactivates Access Stratum (AS) security according to the message.
- AS Access Stratum
- Step 503 If step 502 fails, the terminal leaves the RRC_CONNECTED state.
- Step 504 If step 502 succeeds, the RRC entity of the terminal takes out the data unit embedded in the message as a PDU.
- Step 505 The RRC entity submits the PDU to the PDCP entity.
- Step 506 The PDCP entity processes the PDU according to the SRB1 and produces a PDCP SDU.
- Step 507 The PDCP entity delivers the PDU to the RRC entity.
- Step 508 The RRC entity resumes SRB2 and DRB according to the PDU.
- Step 509 If step 508 fails, the terminal initiates the standard connection re-establishment procedure.
- Step 510 If step 508 succeeds, the terminal acknowledges the success.
- FIG. 6 is a flowchart representation of a method 600 for wireless communication.
- the method 600 includes, at 602 , receiving, at a wireless communication node, a first message from a mobile device requesting a reestablishment of a network connection.
- the method 600 includes, at 604 , transmitting, from the wireless communication node, a second message to the mobile device.
- the second message includes information for reestablishing and reconfiguring the network connection.
- the method 600 includes, at 606 , receiving, at the wireless communication node, a third message from the mobile device acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- FIG. 7 is a flowchart representation of a method 700 for wireless communication.
- the method 700 includes, at 702 , transmitting, from a mobile device, a first message to a wireless communication node requesting a reestablishment of a network connection.
- the method 700 includes, at 704 , receiving, at the mobile device, a second message from the wireless communication node.
- the second message including information for reestablishing and reconfiguring the network connection.
- the method 700 includes, at 706 , transmitting, from the mobile device, a third message to the wireless communication node acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- the terminal can maintain the source connection and the target connection at the same time.
- the terminal can maintain the source connection and the target connection at the same time.
- it is difficult to guarantee the success of both connections due to unreliable communications caused by the contention-based protocol and potential weak signals at the edge of the cell(s).
- the source node may duplicate all the downlink PDCP SDUs for which transmissions have not been completed and acknowledged by the UE. The source node then can forward these PDCP SDUs with their respective Sequence Numbers (SNs) to the target node. The target may transmit the duplicated PDCP SDU with its own key.
- SNs Sequence Numbers
- FIG. 8 shows a schematic diagram of a data flow for a downlink transmission in accordance with the disclosed technology.
- the source node 801 includes an additional routing and duplication module 813 for handover or change of nodes in its PDCP entity 811 to perform packet duplication with its sequence number prior to the header compression of the data packets.
- the source node 801 receives a PDCP SDU from upper layers, it associates the SDU with a PDCP SN.
- the source node 801 duplicates the PDCP SDU, and forwards the duplicated PDCP SDU to the target node 802 .
- the source node 801 continues to transmit data to the terminal 803 .
- the target node 802 can perform header compression of the PDCP SDU (if configured) directly in its PDCP entity 812 .
- the source node 801 and the target node 802 can communication with each other (e.g., via an Xn message) to inform the other node of the PDCP SDU SN.
- the Xn message can be a new type of message.
- the Xn message can also reuse the structure of the SN STATUS TRANSFER message or use a new message.
- the Xn message includes the PDCP SDUs SN (e.g., as a list or a bitmap) that have been acknowledged by the terminal. After a node (e.g., either the source node or the target node) receives the acknowledged PDCP SDUs SN in the Xn message, it can determine that these PDCP SDU have be completed and discard them.
- the Xn message includes the PDCP SDUs SN (e.g., as a list or a bitmap) that have not been acknowledged by the terminal.
- a node e.g., either the source node or the target node
- receives the unacknowledged PDCP SDUs SN in the Xn message it checks whether these PDCP SDUs have been acknowledge by the terminal on its end. If acknowledgments from the terminal for the PDCP SDUs are not received by either the source node or the target node, the node can determine that these PDCP SDU need to be transmitted and discard the PDCP SDU whose SN is smaller than the smallest SN among the unacknowledged PDCP SDUs.
- the terminal 803 When the terminal 803 receives the command for the handover or change of node operation, it can establish a new DRB and the corresponding PDCP, RLC, MAC entities for the target node 802 . If the duplication mode is configured, the terminal can reorder the data it receives the data from both the target node and source node via a duplicate detection mechanism.
- FIG. 9A is a flowchart representation of a method 900 for wireless communication.
- the method 900 includes, at 902 , transmitting, from a first wireless communication node over a first transmission link, a set of data packets to a mobile device during a handover or a change of node operation.
- the method 900 also includes, at 904 , transmitting, from the first wireless communication node over a second transmission link, the set of data packets to a second wireless communication node during the handover or the change of node operation to cause the second wireless communication to send the set of data packets to the mobile device over a third transmission link.
- FIG. 9B is a flowchart representation of a method 950 for wireless communication.
- the method 950 includes, at 952 , receiving, at a mobile device, a set of data packets from a first wireless communication node over a first wireless link during a handover operation.
- the method includes, at 954 , receiving, at the mobile device, at least a subset of the set of data packets from a second wireless communication node over a second wireless link during the handover operation.
- the method 950 includes, at 956 , decoding the data packets based on the set of data packets from the first wireless communication node and the set of data packets from the second wireless communication node.
- FIG. 10 shows a schematic diagram of a data flow for an uplink transmission in accordance with the disclosed technology.
- the terminal 1003 when the terminal 1003 receives a command for a handover or a change of node operation, it can establish a new DRB and the corresponding PDCP, RLC, MAC entities for the target node.
- the new PDCP entity 1011 can include an additional routing and/or duplication module 1013 for handover or change of nodes to perform packet duplication with the sequence number of the terminal prior to the header compression of the data packets.
- the terminal 1003 receives a PDCP SDU from upper layers, it associates the SDU with a PDCP SN.
- the terminal 1003 duplicates the PDCP SDU, and forwards the duplicated PDCP SDU to the target node 1002 .
- the terminal 1013 continues to transmit data to the source node 1001 .
- the uplink data can be forwarded by either the source node or the target node to another node that is connected with the core network.
- Both the source node and the target node receive the uplink data.
- the two nodes can communication with each other (e.g., via an Xn message) to inform the other node of the PDCP SDU SN.
- the Xn message can be a new type of message.
- the Xn message can also reuse the structure of the SN STATUS TRANSFER message.
- the Xn message includes the PDCP SDUs SN (e.g., as a list or a bitmap) that have been received and/or acknowledged by the node. If the node receives the PDCP SDUs SN, it can determine that these PDCP SDU have been completed.
- the Xn message can include the PDCP SDUs SN (e.g., as a list or a bitmap) that have not been acknowledged by the node.
- a node e.g., either the source node or the target node
- receives the unacknowledged PDCP SDUs SN in the Xn message it checks whether these PDCP SDUs have been acknowledged by itself. If the PDCP SDUs are not acknowledged by either the source node or the target node, the node can determine that these PDCP SDUs need to wait and forward the PDCP SDU whose SN is smaller than the smallest SN among the unacknowledged PDCP SDUs.
- the target node 1002 can receive a duplicated copy of the data packets from the source node 1001 .
- the target node 1002 then performs duplication detection based both the data packets from the terminal 1003 and the data packets from the source node 1001 .
- FIG. 11A is a flowchart representation of a method 1100 for wireless communication.
- the method 1100 includes, at 1102 , transmitting, from a mobile device over a first transmission link, a set of data packets to a first wireless communication node during a handover operation or a change of node.
- the method 1100 also includes, at 1104 , transmitting, from the mobile device over a second transmission link, at least a subset of the set of the data packets to a second wireless communication node during the handover operation or the change of node operation for assisting the first wireless communication node to decode the data packets.
- FIG. 11B is a flowchart representation of a method 1150 for wireless communication.
- the method 1150 includes, at 1152 , receiving, at a first wireless communication node over a first transmission link, a set of data packets from a mobile device during a handover operation or a change of node operation.
- the method 1150 includes, at 1154 , receiving, at the first wireless communication node over a second transmission link, at least a subset of the set of data packets from the second wireless communication node.
- the method 1150 also includes, at 1156 , decoding, by the first wireless communication node, the data packets based on the set of the data packets from the mobile device and at least the subset of the set of data packets from the second wireless communication node.
- a terminal at the edge of a cell is more likely to lose connections using the unlicensed spectrum, it is desirable for the terminal to know its location within a cell to initiate a handover operation in a timely manner.
- the serving node transmits a message to the terminal indicating the location of the terminal. For example, the node can indicate whether a terminal is located closer to the center or to the edge of the cell in a dedicated RRC message.
- the node transmits information, such has conditions and/or thresholds, for the terminal to determine if it is located close to the edge of the cell. For example, the node transmits a threshold value for Reference Signal Received Power (RSRP) to the terminal. If the terminal obtains an RSRP measurement whose absolute value is higher than the threshold, the terminal can determine that it is located close to the edge of the cell.
- RSRP Reference Signal Received Power
- the serving node can transmit information, such as conditions and/or thresholds, for the terminal to determine when to initiate a handover procedure. After obtaining such information from the node, the terminal can initiate a handover operation in advance, thereby hiding some of the latencies introduced by the contention-based protocol (e.g., LBT).
- the contention-based protocol e.g., LBT
- the following conditions and/or thresholds can be used by the terminal to determine if a handover procedure needs to be initiated:
- Mn is the measurement result of a neighboring cell, not taking into account any offsets.
- offsetFreq as defined within measObjectEUTRA corresponding to the frequency of the neighbor cell
- Ocn is the cell specific offset of the neighboring cell (e.g., celllndividualOffset as defined within measObjectEUTRA corresponding to the frequency of the neighboring cell), and set to zero if not configured for the neighboring cell.
- celllndividualOffset as defined within measObjectEUTRA corresponding to the frequency of the neighboring cell
- Mp is the measurement result of the PCell or the Primary Secondary Cell (PSCell), not taking into account any offsets.
- Offset is the frequency specific offset of the frequency of the PCell/PSCell (e.g., offsetFreq as defined within measObjectEUTRA corresponding to the frequency of the PCell/PSCell).
- Ocp is the cell specific offset of the PCell/PSCell (e.g., celllndividualOffset as defined within measObjectEUTRA corresponding to the frequency of the PCell/PSCell), and is set to zero if not configured for the PCell/PSCell.
- celllndividualOffset as defined within measObjectEUTRA corresponding to the frequency of the PCell/PSCell
- Hys is the hysteresis parameter for the A3 event (e.g., hysteresis as defined within reportConfigEUTRA for this event).
- Off is the offset parameter for this event (e.g., a3-Offset as defined within reportConfigEUTRA for this event).
- Mn, Mp are expressed in dBm in case of RSRP, or in dB in case of RSRQ and RS-SINR. Ofn, Ocn, Ofp, Ocp, Hys, Off are expressed in dB.
- Rn is the measurement result (e.g., Received Strength Signal Indicator (RSSI)) of the neighboring cell.
- R threshold is the threshold parameter corresponding to the RSSI.
- COn is the measurement result (e.g., Channel Occupancy (CO)) of the neighboring cell.
- CO threshold is the threshold parameter corresponding to the CO.
- the terminal performs RSSI and channel occupancy measurements.
- the node can accordingly inform the terminal of the condition to initiate the connection re-establishment procedure (e.g., thresholds for the RSSI and/or channel occupancy measurements).
- the terminal can initiate the connection re-establishment procedure.
- the terminal can maintain the source connection and the target connection at the same time.
- the connections can be unreliable due to the contention-based protocol and potential weak signals at the edge of the cell(s). Therefore, in some embodiments, the source node and the target node can coordinate a Time Division Multiplexing (TDM) pattern for the spectrum to reduce interference and delay—one node can avoid using the contention window reserved for the other node.
- TDM Time Division Multiplexing
- FIG. 12 shows a schematic diagram of a representative TMD pattern in accordance with the disclosed technology.
- the source node 1201 and the target node 1202 coordinate to obtain a TDM pattern 1211 .
- a node can pre-allocate uplink and/or downlink grant(s) for the terminal.
- the terminal can correspondingly transmit data using the pre-allocated grants.
- the pre-allocated grant(s) are allocated according to the TMD pattern to reduce interference and delay.
- the TDM pattern 1211 includes one or more preallocated grants 1213 .
- Each grant includes a number of contiguous symbols or frames in the time domain.
- a grant can be represented by a start time, a duration (e.g., a transmission window), and a periodicity.
- a duration e.g., a transmission window
- the transmission window enhances the probability that the terminal completes a successful transmission at a particular time-domain location.
- the preallocated grant(s) can be included the RRCConnectionReconfiguration message.
- the source node 1201 and the target node 1202 can coordinate the TDM pattern for the preallocated uplink/downlink/downlink grant(s).
- the source node 1201 can include configuration information for the preallocated uplink/downlink grant grant(s) of the source node in a handover request message.
- the target node 1203 can include configuration information for the preallocated uplink/downlink grant(s) of the target node in a corresponding handover request acknowledge message.
- the source node 1201 and the target node 1203 may have different proallocated uplink/downlink grants, and can choose whether to modify the respective grant configuration(s) to reach an agreement.
- RLM Radio Link Monitoring
- RS Reference Signals
- FIG. 15 is a flowchart representation of a method 1500 for wireless communication.
- the method 1500 includes, at 1502 , monitoring, at a mobile device, a first number of failures of a network activity within a first evaluation period.
- the method 1500 includes, at 1504 , determining, by the mobile device, based on the first number of failures of the network activity, a network problem caused by a network access using a contention-based protocol.
- the method 1500 includes, at 1506 , initiating, by the mobile device, a procedure to recover from the network problem or to report the network problem.
- the terminal can evaluate or determine whether one or more RLM-RS are transmitted successfully from the node.
- the terminal can further determine how many RLM-RS are transmitted successfully from the node and/or how many RLM-RS fail to be transmitted successfully from the node.
- the terminal can monitor RLM-RS transmissions in an evaluation period T1 using the LBT as the contention-based protocol.
- lower layers e.g., Layer 1
- the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem.
- lower layers e.g., Layer 1
- the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem.
- the threshold can be either zero or all of the RLM-RS transmitted.
- lower layers e.g., Layer 1
- the threshold can be either zero or all of the RLM-RS transmitted.
- lower layers e.g., Layer 1
- the threshold can be either zero or all of the RLM-RS transmitted.
- the RRC entity can maintain a different evaluation period T3 (e.g., T3>T1).
- the entity can start a timer and detect an RLM-RS LBT problem after receiving N consecutive indications that there is an RLM-RS LBT problem from the lower layers within the evaluation period T3.
- the terminal detects the RLM-RS LBT problems in the PCell, the terminal can leave the RRC_CONNECTED state if AS security has not been activated. In some implementations, the terminal can initiate the connection re-establishment procedure.
- the terminal detects the RLM-RS LBT problems in the PSCell, the terminal can initiate the Secondary Cell Group (SCG) failure information procedure.
- the SCG failure information message can carry information such as the failureType (which can be set to the RLM-RS LBT detection failure), and measurement results with corresponding RSSI and channel occupancy for the inter-frequency.
- the terminal can monitor RLM-RS transmissions in more than one evaluation periods.
- the terminal can monitor RLM-RS transmissions in an evaluation period T1 using the LBT as the contention-based protocol.
- lower layers e.g., Layer 1
- the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem.
- lower layers e.g., Layer 1
- the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem.
- the terminal can use a second evaluation period T2.
- lower layers e.g., Layer 1
- lower layers e.g., Layer 1
- the number of the transmitted RLM-RS in the evaluation period T2 is higher than a threshold
- lower layers e.g., Layer 1
- the RRC entity can maintain a different evaluation period T3 (e.g., T3>T1).
- the entity can start a timer and detect an RLM-RS LBT problem after receiving N1 consecutive indications that there is an RLM-RS LBT problem from the lower layers within the evaluation period T3.
- the RRC entity can stop the timer upon receiving N2 consecutive indications indicating an RLM-RS LBT recovery from lower layers. The RRC entity then can determine that there is a recovery from the RLM-RS LBT problems.
- the terminal detects RLM-RS LBT problems in the PCell, the terminal can leave the RRC_CONNECTED state if AS security has not been activated. In some implementations, the terminal can initiate the connection re-establishment procedure.
- the terminal detects RLM-RS LBT problems in the PSCell, the terminal can initiate the Secondary Cell Group (SCG) failure information procedure.
- the SCG failure information message can carry information such as the failureType (which can be set to the RLM-RS LBT detection failure), and measurement results with corresponding RSSI and channel occupancy for the inter-frequency.
- SR Service Request
- PRACH Random-access procedure
- the MAC entity when the number of SR LBT failures or the number of preamble LBT failures reaches a threshold, the MAC entity indicates a SR LBT problem or a preamble LBT problem to the RRC entity.
- the terminal detects the SR LBT problems or the preamble LBT problems in the PCell, the terminal can leave the RRC_CONNECTED state if AS security has not been activated. In some implementations, the terminal can initiate the connection re-establishment procedure.
- the terminal detects the SR LBT problems or the preamble LBT problems in the PSCell, the terminal can initiate the Secondary Cell Group (SCG) failure information procedure.
- the SCG failure information message can carry information such as the failureType (which can be set to the SR LBT failure or the preamble LBT failure), and measurement results with corresponding RSSI and channel occupancy for the inter-frequency.
- FIG. 13 shows an example of a wireless communication system 1300 where techniques in accordance with one or more embodiments of the present technology can be applied.
- a wireless communication system 1300 can include one or more base stations (BSs) 1305 a , 1305 b , one or more wireless devices 1310 a , 1310 b , 1310 c , 1310 d , and a core network 1325 .
- a base station 1305 a , 1305 b can provide wireless service to wireless devices 1310 a , 1310 b , 1310 c and 1310 d in one or more wireless sectors.
- a base station 1305 a , 1305 b includes directional antennas to produce two or more directional beams to provide wireless coverage in different sectors.
- the core network 1325 can communicate with one or more base stations 1305 a , 1305 b .
- the core network 1325 provides connectivity with other wireless communication systems and wired communication systems.
- the core network may include one or more service subscription databases to store information related to the subscribed wireless devices 1310 a , 1310 b , 1310 c , and 1310 d .
- a first base station 1305 a can provide wireless service based on a first radio access technology
- a second base station 1305 b can provide wireless service based on a second radio access technology.
- the base stations 1305 a and 1305 b may be co-located or may be separately installed in the field according to the deployment scenario.
- the wireless devices 1310 a , 1310 b , 1310 c , and 1310 d can support multiple different radio access technologies.
- a wireless communication system can include multiple networks using different wireless technologies.
- a dual-mode or multi-mode wireless device includes two or more wireless technologies that could be used to connect to different wireless networks.
- FIG. 14 is a block diagram representation of a portion of a radio station.
- a radio station 1405 such as a base station or a wireless device (or UE) can include processor electronics 1410 such as a microprocessor that implements one or more of the wireless techniques presented in this document.
- the radio station 1405 can include transceiver electronics 1415 to send and/or receive wireless signals over one or more communication interfaces such as antenna 1420 .
- the radio station 1405 can include other communication interfaces for transmitting and receiving data.
- Radio station 1405 can include one or more memories (not explicitly shown) configured to store information such as data and/or instructions.
- the processor electronics 1410 can include at least a portion of the transceiver electronics 1415 . In some embodiments, at least some of the disclosed techniques, modules or functions are implemented using the radio station 1405 .
- a method for wireless communication includes receiving, at a wireless communication node, a first message from a mobile device requesting a reestablishment of a network connection; transmitting, from the wireless communication node, a second message to the mobile device, the second message including information for reestablishing and reconfiguring the network connection; and receiving, at the wireless communication node, a third message from the mobile device acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- the reestablishment of the network connection is achieved using less than five message transmissions between the wireless communication node and the mobile device.
- the information for reconfiguring the network connection is carried in a protocol data unit produced by a Packet Data Convergence Protocol entity.
- the information for reconfiguring the network connection is carried by a protocol data unit packet or an octet string included in the second message.
- a method for wireless communication includes transmitting, from a mobile device, a first message to a wireless communication node requesting a reestablishment of a network connection; receiving, at the mobile device, a second message from the wireless communication node, the second message including information for reestablishing and reconfiguring the network connection; and transmitting, from the mobile device, a third message to the wireless communication node acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- the reestablishment of the network connection is achieved using less than five message transmissions between the wireless communication node and the mobile device.
- the information for reconfiguring the network connection is carried in a protocol data unit produced by a Packet Data Convergence Protocol entity.
- the information for reconfiguring the network connection is carried by a protocol data unit packet or an octet string included in the second message.
- a method for wireless communication includes transmitting, from a first wireless communication node over a first transmission link, a set of data packets to a mobile device during a handover or a change of node operation; and transmitting, from the first wireless communication node over a second transmission link, at least a subset of the set of data packets to a second wireless communication node during the handover or the change of node operation to cause the second wireless communication to send at least the subset of the set of data packets to the mobile device over a third transmission link.
- the subset of the set of data packets transmitted over the second transmission link is not acknowledged by the mobile device.
- the subset of the set of data packets is duplicated by a packet data convergence protocol entity of the first wireless communication node with a sequence number of the first wireless communication node prior to a head compression of the subset of the set of data packets.
- the method includes transmitting, from the first wireless communication node over the second transmission link, a message to the second wireless communication node during the handover or the change of node operation, the message including information of a second subset of the set of data packets that is acknowledged by the mobile device.
- the method includes configuring the handover or the change of node operation by: transmitting, from the first wireless communication node, a first message to the second wireless communication node requesting a handover or a change of node operation from the first wireless communication node to the second wireless communication node, wherein the first message includes information for configuring a first set of transmission grants according to a first time-domain multiplexing pattern; receiving, at the first wireless communication node, a second message from the second wireless communication node acknowledging the hand over or the change of node operation, wherein the second message includes information for configuring a second set of transmission grants according to a second time-domain multiplexing pattern; and determining, based on the first and second time-domain multiplexing patterns, a third set of transmission grants according to a third time-domain multiplex pattern.
- each set of the first, second, and third sets transmission grants is organized according to a time division multiplexing pattern.
- each grant in the time division multiplexing pattern is represented by at least one of the following: a start time, a transmission window, or a periodicity of the grant.
- the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine when to initiate the handover or the change of node operation.
- the information includes at least one of: a threshold value for a Received Strength Signal Indicator, or a threshold value for a Channel Occupancy.
- the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine whether the mobile device is located at an edge of a cell provided by the first wireless communication node.
- the information includes at least a threshold value for a Reference Signal Received Power measurement.
- a method for wireless communication includes receiving, at a mobile device, a set of data packets from a first wireless communication node over a first wireless link during a handover operation or a change of node operation; receiving, at the mobile device, at least a subset of the set of data packets from a second wireless communication node over a second wireless link during the handover operation or the change of node; and decoding the data packets based on the set of data packets from the first wireless communication node and at least the subset of the set of data packets from the second wireless communication node.
- the method includes performing duplication detection based on the set of data packets from the first wireless communication node and the subset of the set of data packets from the second wireless communication node.
- the method includes receiving, at the mobile device, information from the first wireless communication node for determining when to initiate the handover operation or the change of node operation.
- the information includes at least one of: a threshold value for a Received Strength Signal Indicator, or a threshold value for a Channel Occupancy.
- the method includes receiving, at the mobile device, information from the first wireless communication node for determining whether the mobile device is located at an edge of a cell provided by the first wireless communication node.
- the information includes at least a threshold value for a Reference Signal Received Power measurement.
- a method for wireless communication includes transmitting, from a mobile device, a set of data packets to a first wireless communication node during a handover operation or a change of node; and transmitting, from the mobile device, at least a subset of the set of the data packets to a second wireless communication node during the handover operation or the change of node operation for assisting the first wireless communication node to decode the data packets.
- the subset of the set of data packets is not acknowledged by the first wireless communication node. In some implementations, the subset of the set of data packets is duplicated by a packet data convergence protocol entity with a sequence number of the mobile device prior to a header compression of the subset of the set of data packets.
- the method includes receiving, at the mobile device, information for assisting the mobile device to determine when to initiate the handover or the change of node operation from the first wireless communication node. In some embodiments, the method includes receiving, at the mobile device, information from the first wireless communication node for assisting the mobile device to determine whether the mobile device is located at an edge of a cell provided by the first wireless communication node.
- a method for wireless communication includes receiving, at a first wireless communication node, a set of data packets from a mobile device during a handover operation or a change of node operation; receiving, at the first wireless communication node over a second transmission link, at least a subset of the set of data packets from the second wireless communication node; and decoding, by the first wireless communication node, the data packets based on the set of the data packets from the mobile device and at least the subset of the set of data packets from the second wireless communication node.
- the method includes receiving, at the first wireless communication node, a message from the second wireless communication node, the message including information of at least the subset of the set of data packets received at the second wireless communication node. In some embodiments, the method includes performing, at the first wireless communication node, duplication detection based on the set of data packets from the mobile device and the subset of the set of data packets from the second wireless communication node.
- the method includes configuring the handover or the change of node operation by: transmitting, from the first wireless communication node, a first message to the second wireless communication node requesting a handover or a change of node operation from the first wireless communication node to the second wireless communication node, wherein the first message includes information for configuring a first set of transmission grants according to a first time-domain multiplexing pattern; receiving, at the first wireless communication node, a second message from the second wireless communication node acknowledging the hand over or the change of node operation, wherein the second message includes information for configuring a second set of transmission grants according to a second time-domain multiplexing pattern; and determining, based on the first and second time-domain multiplexing patterns, a third set of transmission grants according to a third time-domain multiplex pattern.
- each set of the first, second, and third sets transmission grants is organized according to a time division multiplexing pattern.
- each grant in the time division multiplexing pattern is represented by at least one of the following: a start time, a transmission window, or a periodicity of the grant.
- the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine when to initiate the handover or the change of node operation.
- the information includes at least one of: a threshold value for a Received Strength Signal Indicator, or a threshold value for a Channel Occupancy.
- the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine whether the mobile device is located at an edge of a cell provided by the first wireless communication node.
- the information includes at least a threshold value for a Reference Signal Received Power measurement.
- a method for wireless communication includes monitoring, at a mobile device, a number of failures of a network activity within a first evaluation period; determining, by the mobile device, based on the number of failures of the network activity, a network problem has occurred, the network problem caused by a network access using a contention-based protocol; and initiating, by the mobile device, a procedure to recover from the network problem or to report the network problem.
- determining the network problem comprises comparing the number of failures of the network activity to a threshold. In some embodiments, the method includes monitoring, at the mobile device, the second number of failures of the network activity within a second evaluation period; and determining, by the mobile device, based on the first and second numbers of failures of the network activity, a recovery from the network problem has occurred.
- the network activity includes at least one of the following: a Radio Link Monitoring Reference Signal transmission, a Service Request transmission, or a random-access procedure.
- the method includes determining, by the mobile device, that the network problem happens in a primary cell provided by a network, wherein the procedure to recover from the network problem or to report the network problem includes a Radio Resource Control reestablishment procedure.
- the method includes determining, by the mobile device, that the network problem happens in a primary secondary cell provided by a network, wherein the procedure to recover from the network problem or to report the network problem includes a Secondary Cell Group failure information procedure.
- the disclosed and other embodiments, modules and the functional operations described in this document can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this document and their structural equivalents, or in combinations of one or more of them.
- the disclosed and other embodiments can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus.
- the computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more them.
- data processing apparatus encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers.
- the apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
- a propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode information for transmission to suitable receiver apparatus.
- a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- a computer program does not necessarily correspond to a file in a file system.
- a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
- a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- the processes and logic flows described in this document can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output.
- the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
- a processor will receive instructions and data from a read only memory or a random-access memory or both.
- the essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data.
- a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
- mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
- a computer need not have such devices.
- Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks.
- semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
- magnetic disks e.g., internal hard disks or removable disks
- magneto optical disks e.g., CD ROM and DVD-ROM disks.
- the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This patent document is a continuation of and claims benefit of priority to International Patent Application No. PCT/CN2018/083890, filed on Apr. 20, 2020. The entire content of the before-mentioned patent application is incorporated by reference as part of the disclosure of this application.
- This patent document is directed generally to digital wireless communications.
- Mobile communication technologies are moving the world toward an increasingly connected and networked society. The rapid growth of mobile communications and advances in technology have led to greater demand for capacity and connectivity. Other aspects, such as energy consumption, device cost, spectral efficiency, and latency are also important to meeting the needs of various communication scenarios. Various techniques, including new ways to provide higher quality of service, are being discussed.
- This document discloses methods, systems, and devices related to mobility management, e.g., reducing transmission delay and interference, and/or increasing transmission reliability, using the unlicensed spectrum.
- In one representative aspect, a method for wireless communication is disclosed. The method includes receiving, at a wireless communication node, a first message from a mobile device requesting a reestablishment of a network connection; transmitting, from the wireless communication node, a second message to the mobile device, the second message including information for reestablishing and reconfiguring the network connection; and receiving, at the wireless communication node, a third message from the mobile device acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- In another representative aspect, a method for wireless communication is disclosed. The method includes transmitting, from a mobile device, a first message to a wireless communication node requesting a reestablishment of a network connection; receiving, at the mobile device, a second message from the wireless communication node, the second message including information for reestablishing and reconfiguring the network connection; and transmitting, from the mobile device, a third message to the wireless communication node acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- In another representative aspect, a method for wireless communication is disclosed. The method includes transmitting, from a first wireless communication node over a first transmission link, a set of data packets to a mobile device during a handover or a change of node operation; and transmitting, from the first wireless communication node over a second transmission link, at least a subset of the set of data packets to a second wireless communication node during the handover or the change of node operation to cause the second wireless communication to send at least the subset of the set of data packets to the mobile device over a third transmission link.
- In another representative aspect, a wireless communication method is disclosed. The method includes receiving, at a mobile device, a set of data packets from a first wireless communication node over a first wireless link during a handover operation or a change of node operation; receiving, at the mobile device, at least a subset of the set of data packets from a second wireless communication node over a second wireless link during the handover operation or the change of node; and decoding the data packets based on the set of data packets from the first wireless communication node and at least the subset of the set of data packets from the second wireless communication node.
- In another representative aspect, a wireless communication method is disclosed. The method includes transmitting, from a mobile device, a set of data packets to a first wireless communication node during a handover operation or a change of node; and transmitting, from the mobile device, at least a subset of the set of the data packets to a second wireless communication node during the handover operation or the change of node operation for assisting the first wireless communication node to decode the data packets.
- In another representative aspect, a wireless communication method is disclosed. The method includes receiving, at a first wireless communication node, a set of data packets from a mobile device during a handover operation or a change of node operation; receiving, at the first wireless communication node over a second transmission link, at least a subset of the set of data packets from the second wireless communication node; and decoding, by the first wireless communication node, the data packets based on the set of the data packets from the mobile device and at least the subset of the set of data packets from the second wireless communication node.
- In another representative aspect, a wireless communication method is disclosed. The method includes monitoring, at a mobile device, a first number of failures of a network activity within a first evaluation period; determining, by the mobile device, based on the first number of failures of the network activity, a network problem caused by a network access using a contention-based protocol; and initiating, by the mobile device, a procedure to recover from the network problem or to report the network problem.
- In another representative aspect, a wireless communications apparatus comprising a processor is disclosed. The processor is configured to implement a method described herein.
- In yet another representative aspect, the various techniques described herein may be embodied as processor-executable code and stored on a computer-readable program medium.
- The details of one or more implementations are set forth in the accompanying attachments, the drawings, and the description below. Other features will be apparent from the description and drawings, and from the claims.
-
FIG. 1 shows a representative deployment of a licensed and unlicensed spectrum that can be used in New Radio (NR) communication systems. -
FIG. 2 shows a Radio Resource Control (RRC) connection re-establishment procedure used in some of the current wireless communication systems. -
FIG. 3 shows a representative re-establishment procedure in accordance with the disclosed technology. -
FIG. 4 is a flowchart representation of representative steps that a wireless communication node can take to generate a message in accordance with the disclosed technology. -
FIG. 5 is a flowchart representation of representative steps that a terminal can take to decode a message in accordance with the disclosed technology. -
FIG. 6 is a flowchart representation of a method for wireless communication in accordance with the disclosed technology. -
FIG. 7 is a flowchart representation of another method for wireless communication in accordance with the disclosed technology. -
FIG. 8 shows a schematic diagram of a data flow for a downlink transmission in accordance with the disclosed technology. -
FIG. 9A is a flowchart representation of a method for wireless communication. -
FIG. 9B is another flowchart representation of a method for wireless communication. -
FIG. 10 shows a schematic diagram of a data flow for an uplink transmission in accordance with the disclosed technology. -
FIG. 11A is a flowchart representation of a method for wireless communication in accordance with the disclosed technology. -
FIG. 11B is a flowchart representation of a method for wireless communication in accordance with the disclosed technology. -
FIG. 12 shows a schematic diagram of a representative TMD pattern in accordance with the disclosed technology. -
FIG. 13 shows an example of a wireless communication system where techniques in accordance with one or more embodiments of the present technology can be applied. -
FIG. 14 is a block diagram representation of a portion of a radio station. -
FIG. 15 is a flowchart representation of a method for wireless communication in accordance with the disclosed technology. - The development of the new generation of wireless communication—5G New Radio (NR) communication—is a part of a continuous mobile broadband evolution process to meet the requirements of increasing network demand. NR will provide greater throughput to allow more users connected at the same time. Other aspects, such as energy consumption, device cost, spectral efficiency, and latency are also important to meeting the needs of various communication scenarios.
- The amount of user data in the networks is growing rapidly as NR emerges in the wireless market. The rapid growth of the user data leads to a great demand for the spectrum. Currently, the licensed spectrum that is already assigned to network operators is getting to a saturation point. The use of the licensed spectrum also means high operating cost for the network operators. Therefore, more and more network operators are considering using unlicensed spectrum to increase their service offerings. For deployments in selected regions and/or private networks, efficient use of unlicensed spectrum with a wider bandwidth (e.g., 80 or 100 MHz) can reduce implementation complexity for both the network and the terminal as compared to smaller bandwidths. It is thus desirable to consider use scenarios in which high data rates (e.g., multi-giga bytes per second) are used.
- In current wireless communication systems, the unlicensed spectrum is simply used as a complementary tool for the licensed spectrum. For example, Licensed-Assisted Access (LAA) was introduced in 3GPP release 13 to combine unlicensed spectrum with the licensed band. Access to the unlicensed spectrum via a Secondary Component Carrier (SCell) is assisted by a Primary Component Carrier (PCell) on the licensed spectrum using the carrier aggregation framework. However, using LAA, the unlicensed spectrum needs to be tied to the licensed spectrum. This limits the deployment and flexible usage of the unlicensed spectrum.
-
FIG. 1 shows a representative deployment of licensed and unlicensed spectrum that can be used in the NR communication systems. InFIG. 1 , Node A (101) operating in the licensed spectrum can support seamless coverage. Node B (102) and Node C (103) operating in the unlicensed spectrum can be deployed in sub-regions, providing a subset of services or all the services for a terminal (also referred to as a mobile device or a user equipment). The terminal can access Node B or Node C directly. Alternatively, the terminal can access Node A directly as a master node, while Node B and Node C are functioning as secondary nodes. - Unlike in the licensed spectrum, the terminals gain access to the unlicensed spectrum through a contention-based protocol (e.g., “Listen Before Talk” (LBT)). To provide efficient communications using the unlicensed spectrum, different factors (e.g., signal quality, preemption probability, and/or interference level) are evaluated for different use scenarios, including handovers and node changes. Particularly, providing reliable connections and reducing communication delays are important factors to consider for the usage of the unlicensed spectrum.
- This document describes techniques that can be implemented in various embodiments to achieve efficient communications using the unlicensed spectrum. The techniques can be used in various scenarios (e.g., connection re-establishment, handovers, and/or change of node) to provide mobile devices with stable connections and to minimize communication issues due to delays. Some examples of the disclosed techniques are described in the following example embodiments.
- Compared with the licensed spectrum, the unlicensed spectrum is more susceptible to interference. In some cases, the contention-based protocol may cause the signals in the unlicensed spectrum to be less reliable. For example, for terminals located at the edge of the cell, the signal quality can be particularly low. Furthermore, the serving cell, the neighboring cells, and the terminals may compete the common spectrum, causing serious interference. Therefore, for the terminals at the edge of a cell, radio link failure and Radio Resource Control (RRC) connection re-establishment procedure happens more frequently.
-
FIG. 2 shows an RRC connection re-establishment procedure used in some of the current wireless communication systems (e.g., Long Term Evolution (LTE) systems). As shown inFIG. 2 , five messages are needed to complete this recovery procedure. The terminal first transmits, at 201, an RRCConnectionReestablishmentRequest message to the node. The node transmits, at 202, an RRCConnectionReestablishment message in response to the previous message. The terminal transmits, at 203, an RRCConnectionReestablishmentComplete message to indicate the reestablishment is completed. The node then transmits, at 204, an RRCConnectionReconfiguration message to reconfigure the connection. The terminal transmits, at 205, an RRCConnectionReconfigurationComplete to indicate the reconfiguration has completed. - Because a contention-based protocol (e.g., LBT) is used for unlicensed spectrum, both the terminal and the node need to contend the medium for message transmissions. Thus, the current procedure would lead to five times of medium contention. The recovery procedure can be further delayed when transmission failures happen—retransmissions of messages also require contention-based access. Therefore, the current procedure is not suitable for efficient connection re-establishment in the unlicensed spectrum.
-
FIG. 3 shows a representative re-establishment procedure in accordance with the disclosed technology. In this procedure, the terminal first transmits, at 301, an RRCConnectionReestablishmentRequest message to the node. The node then, at 302, transmits a message that includes information for both the RRCConnectionReestablishment and the RRCConnectionReconfiguration. In some embodiment, the RRCConnectionReconfiguration message can be embedded into the RRCConnectionReestablishment message. For example, the RRCConnectionReestablishment message can carry a Protocol Data Unit (PDU) packet or octet string that includes the RRCConnectionReconfiguration message. - If both reestablishment and reconfiguration are successful, the terminal can transmit, at 303 and 303′, both the RRCConnectionReestablishmentComplete message and the RRCConnectionReconfigurationComplete message. Alternatively, the terminal can transmit, at 303′, a single RRCConnectionReconfigurationComplete message to indicate that both the reestablishment and reconfiguration are successful. If RRC connection reconfiguration fails, the terminal can transmit, at 303, the RRCConnectionReestablishmentComplete message, and/or initiate the connection the re-establishment procedure. If RRC Connection Reestablishment fails, the terminal can perform actions upon leaving the RRC_CONNECTED state.
- On the network side, when the node receives the RRCConnectionReconfigurationComplete message, it can determine that both reestablishment and reconfiguration are successful. If it only receives the RRCConnectionReestablishmentComplete message, it can determine that the RRCConnectionReestablishment procedure completes and perform the RRCConnectionReconfiguration procedure again.
- Thus, using the improved procedure shown in
FIG. 3 , the number of message transmission required for the connection recovery process can be reduced to three when both the reestablishment and reconfiguration are successful, thereby reducing the amount of time required to complete the recovery using a contention-based protocol in unlicensed medium. -
FIG. 4 is a flowchart representation of representative steps that a wireless communication node can take in the RRC entity and the Packet Data Convergence Protocol (PDCP) entity to generate an RRCConnectionReestablishment message in accordance with the disclosed technology. - Step 401: The node receives a RRCConnectionReestablishmentRequest message from the terminal.
- Step 402: The RRC entity of the node generates configuration parameter for Signaling Radio Bear 1 (SRB1) and sets the content of the RRCConnectionReestablishment message.
- Step 403: The RRC entity also generates configuration parameters for SRB2 and Data Radio Bearer (DRB), and sets the content of RRCConnectionReconfiguration message.
- Step 404: The RRC entity submits the RRCConnectionReconfiguration message to the PDCP entity for processing.
- Step 405: The PDCP entity processes the message according to the reconfigured SRB1 and produce a corresponding PDCP PDU.
- Step 406: The PDCP entity delivers the PDCP PDU to the RRC entity.
- Step 407: The RRC entity embeds the Service Data Unit (SDU) into the RRCConnectionReestablishment message.
- Step 408: The RRC entity submits the RRCConnectionReestablishment message to lower layers for transmission according to the SRB0.
-
FIG. 5 is a flowchart representation of representative steps that a terminal can take in the RRC entity and the PDCP entity to decode the RRCConnectionReestablishment message in accordance with the disclosed technology. - Step 501: The terminal receives an RRCConnectionReestablishment message.
- Step 502: The terminal resumes SRB1 and reactivates Access Stratum (AS) security according to the message.
- Step 503: If
step 502 fails, the terminal leaves the RRC_CONNECTED state. - Step 504: If
step 502 succeeds, the RRC entity of the terminal takes out the data unit embedded in the message as a PDU. - Step 505: The RRC entity submits the PDU to the PDCP entity.
- Step 506: The PDCP entity processes the PDU according to the SRB1 and produces a PDCP SDU.
- Step 507: The PDCP entity delivers the PDU to the RRC entity.
- Step 508: The RRC entity resumes SRB2 and DRB according to the PDU.
- Step 509: If
step 508 fails, the terminal initiates the standard connection re-establishment procedure. - Step 510: If
step 508 succeeds, the terminal acknowledges the success. -
FIG. 6 is a flowchart representation of amethod 600 for wireless communication. Themethod 600 includes, at 602, receiving, at a wireless communication node, a first message from a mobile device requesting a reestablishment of a network connection. Themethod 600 includes, at 604, transmitting, from the wireless communication node, a second message to the mobile device. The second message includes information for reestablishing and reconfiguring the network connection. Themethod 600 includes, at 606, receiving, at the wireless communication node, a third message from the mobile device acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection. -
FIG. 7 is a flowchart representation of amethod 700 for wireless communication. Themethod 700 includes, at 702, transmitting, from a mobile device, a first message to a wireless communication node requesting a reestablishment of a network connection. Themethod 700 includes, at 704, receiving, at the mobile device, a second message from the wireless communication node. The second message including information for reestablishing and reconfiguring the network connection. Themethod 700 includes, at 706, transmitting, from the mobile device, a third message to the wireless communication node acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection. - During a handover and/or change of node operation, the terminal can maintain the source connection and the target connection at the same time. However, for the unlicensed spectrum, it is difficult to guarantee the success of both connections due to unreliable communications caused by the contention-based protocol and potential weak signals at the edge of the cell(s).
- In order to enhance data transmission reliability during the handover and/or change of node operations, the source node may duplicate all the downlink PDCP SDUs for which transmissions have not been completed and acknowledged by the UE. The source node then can forward these PDCP SDUs with their respective Sequence Numbers (SNs) to the target node. The target may transmit the duplicated PDCP SDU with its own key.
-
FIG. 8 shows a schematic diagram of a data flow for a downlink transmission in accordance with the disclosed technology. In the embodiment shown inFIG. 8 , thesource node 801 includes an additional routing and duplication module 813 for handover or change of nodes in itsPDCP entity 811 to perform packet duplication with its sequence number prior to the header compression of the data packets. When thesource node 801 receives a PDCP SDU from upper layers, it associates the SDU with a PDCP SN. During a handover and/or a change of node operation, thesource node 801 duplicates the PDCP SDU, and forwards the duplicated PDCP SDU to thetarget node 802. At the same time, thesource node 801 continues to transmit data to the terminal 803. After receiving the forwarded data, thetarget node 802 can perform header compression of the PDCP SDU (if configured) directly in itsPDCP entity 812. - In some embodiments, to communicate the PDCP SDUs SN that have been acknowledged by the terminal 803, the
source node 801 and thetarget node 802 can communication with each other (e.g., via an Xn message) to inform the other node of the PDCP SDU SN. - The Xn message can be a new type of message. The Xn message can also reuse the structure of the SN STATUS TRANSFER message or use a new message. In some implementations, the Xn message includes the PDCP SDUs SN (e.g., as a list or a bitmap) that have been acknowledged by the terminal. After a node (e.g., either the source node or the target node) receives the acknowledged PDCP SDUs SN in the Xn message, it can determine that these PDCP SDU have be completed and discard them.
- In some implementations, the Xn message includes the PDCP SDUs SN (e.g., as a list or a bitmap) that have not been acknowledged by the terminal. After a node (e.g., either the source node or the target node) receives the unacknowledged PDCP SDUs SN in the Xn message, it checks whether these PDCP SDUs have been acknowledge by the terminal on its end. If acknowledgments from the terminal for the PDCP SDUs are not received by either the source node or the target node, the node can determine that these PDCP SDU need to be transmitted and discard the PDCP SDU whose SN is smaller than the smallest SN among the unacknowledged PDCP SDUs.
- When the terminal 803 receives the command for the handover or change of node operation, it can establish a new DRB and the corresponding PDCP, RLC, MAC entities for the
target node 802. If the duplication mode is configured, the terminal can reorder the data it receives the data from both the target node and source node via a duplicate detection mechanism. -
FIG. 9A is a flowchart representation of amethod 900 for wireless communication. Themethod 900 includes, at 902, transmitting, from a first wireless communication node over a first transmission link, a set of data packets to a mobile device during a handover or a change of node operation. Themethod 900 also includes, at 904, transmitting, from the first wireless communication node over a second transmission link, the set of data packets to a second wireless communication node during the handover or the change of node operation to cause the second wireless communication to send the set of data packets to the mobile device over a third transmission link. -
FIG. 9B is a flowchart representation of amethod 950 for wireless communication. Themethod 950 includes, at 952, receiving, at a mobile device, a set of data packets from a first wireless communication node over a first wireless link during a handover operation. The method includes, at 954, receiving, at the mobile device, at least a subset of the set of data packets from a second wireless communication node over a second wireless link during the handover operation. Themethod 950 includes, at 956, decoding the data packets based on the set of data packets from the first wireless communication node and the set of data packets from the second wireless communication node. -
FIG. 10 shows a schematic diagram of a data flow for an uplink transmission in accordance with the disclosed technology. In the embodiment shown inFIG. 10 , when the terminal 1003 receives a command for a handover or a change of node operation, it can establish a new DRB and the corresponding PDCP, RLC, MAC entities for the target node. Thenew PDCP entity 1011 can include an additional routing and/orduplication module 1013 for handover or change of nodes to perform packet duplication with the sequence number of the terminal prior to the header compression of the data packets. When the terminal 1003 receives a PDCP SDU from upper layers, it associates the SDU with a PDCP SN. During a handover and/or a change of node operation, the terminal 1003 duplicates the PDCP SDU, and forwards the duplicated PDCP SDU to thetarget node 1002. At the same time, the terminal 1013 continues to transmit data to thesource node 1001. The uplink data can be forwarded by either the source node or the target node to another node that is connected with the core network. - Both the source node and the target node receive the uplink data. In some embodiments, to communicate the PDCP SDUs SN that have been received by the node (e.g., either the source node or the target node), the two nodes can communication with each other (e.g., via an Xn message) to inform the other node of the PDCP SDU SN.
- The Xn message can be a new type of message. The Xn message can also reuse the structure of the SN STATUS TRANSFER message. In some implementations, the Xn message includes the PDCP SDUs SN (e.g., as a list or a bitmap) that have been received and/or acknowledged by the node. If the node receives the PDCP SDUs SN, it can determine that these PDCP SDU have been completed.
- In some embodiments, the Xn message can include the PDCP SDUs SN (e.g., as a list or a bitmap) that have not been acknowledged by the node. After a node (e.g., either the source node or the target node) receives the unacknowledged PDCP SDUs SN in the Xn message, it checks whether these PDCP SDUs have been acknowledged by itself. If the PDCP SDUs are not acknowledged by either the source node or the target node, the node can determine that these PDCP SDUs need to wait and forward the PDCP SDU whose SN is smaller than the smallest SN among the unacknowledged PDCP SDUs.
- In the embodiment shown in
FIG. 10 , thetarget node 1002 can receive a duplicated copy of the data packets from thesource node 1001. Thetarget node 1002 then performs duplication detection based both the data packets from the terminal 1003 and the data packets from thesource node 1001. -
FIG. 11A is a flowchart representation of amethod 1100 for wireless communication. Themethod 1100 includes, at 1102, transmitting, from a mobile device over a first transmission link, a set of data packets to a first wireless communication node during a handover operation or a change of node. Themethod 1100 also includes, at 1104, transmitting, from the mobile device over a second transmission link, at least a subset of the set of the data packets to a second wireless communication node during the handover operation or the change of node operation for assisting the first wireless communication node to decode the data packets. -
FIG. 11B is a flowchart representation of amethod 1150 for wireless communication. Themethod 1150 includes, at 1152, receiving, at a first wireless communication node over a first transmission link, a set of data packets from a mobile device during a handover operation or a change of node operation. Themethod 1150 includes, at 1154, receiving, at the first wireless communication node over a second transmission link, at least a subset of the set of data packets from the second wireless communication node. Themethod 1150 also includes, at 1156, decoding, by the first wireless communication node, the data packets based on the set of the data packets from the mobile device and at least the subset of the set of data packets from the second wireless communication node. - Because a terminal at the edge of a cell is more likely to lose connections using the unlicensed spectrum, it is desirable for the terminal to know its location within a cell to initiate a handover operation in a timely manner.
- In some embodiments, the serving node transmits a message to the terminal indicating the location of the terminal. For example, the node can indicate whether a terminal is located closer to the center or to the edge of the cell in a dedicated RRC message.
- In some embodiments, the node transmits information, such has conditions and/or thresholds, for the terminal to determine if it is located close to the edge of the cell. For example, the node transmits a threshold value for Reference Signal Received Power (RSRP) to the terminal. If the terminal obtains an RSRP measurement whose absolute value is higher than the threshold, the terminal can determine that it is located close to the edge of the cell.
- Due to the contention-base protocol for the unlicensed spectrum, late transmissions of the RRC messages can happen more frequently, resulting in more handovers that are too late. To reduce the number of “too late” handovers, the serving node can transmit information, such as conditions and/or thresholds, for the terminal to determine when to initiate a handover procedure. After obtaining such information from the node, the terminal can initiate a handover operation in advance, thereby hiding some of the latencies introduced by the contention-based protocol (e.g., LBT).
- For example, in some embodiments, the following conditions and/or thresholds can be used by the terminal to determine if a handover procedure needs to be initiated:
-
1. Mn+Ofn+Ocn−Hys>Mp+Ofp+Ocp−Off Eq. (1) -
2. Rn<Rthreshold, or Eq. (2) -
3. COn<COthreshold Eq. (3) - In Eq. (1), the variables are defined as follows:
- Mn is the measurement result of a neighboring cell, not taking into account any offsets.
- Ofn is the frequency specific offset of the frequency of the neighboring cell (e.g., offsetFreq as defined within measObjectEUTRA corresponding to the frequency of the neighbor cell).
- Ocn is the cell specific offset of the neighboring cell (e.g., celllndividualOffset as defined within measObjectEUTRA corresponding to the frequency of the neighboring cell), and set to zero if not configured for the neighboring cell.
- Mp is the measurement result of the PCell or the Primary Secondary Cell (PSCell), not taking into account any offsets.
- Ofp is the frequency specific offset of the frequency of the PCell/PSCell (e.g., offsetFreq as defined within measObjectEUTRA corresponding to the frequency of the PCell/PSCell).
- Ocp is the cell specific offset of the PCell/PSCell (e.g., celllndividualOffset as defined within measObjectEUTRA corresponding to the frequency of the PCell/PSCell), and is set to zero if not configured for the PCell/PSCell.
- Hys is the hysteresis parameter for the A3 event (e.g., hysteresis as defined within reportConfigEUTRA for this event).
- Off is the offset parameter for this event (e.g., a3-Offset as defined within reportConfigEUTRA for this event).
- Mn, Mp are expressed in dBm in case of RSRP, or in dB in case of RSRQ and RS-SINR. Ofn, Ocn, Ofp, Ocp, Hys, Off are expressed in dB.
- In Eq. (2), the variables are defined as follows:
- Rn is the measurement result (e.g., Received Strength Signal Indicator (RSSI)) of the neighboring cell. Rthreshold is the threshold parameter corresponding to the RSSI.
- In Eq. (3), the variables are defined as follows:
- COn is the measurement result (e.g., Channel Occupancy (CO)) of the neighboring cell. COthreshold is the threshold parameter corresponding to the CO.
- For example, the terminal performs RSSI and channel occupancy measurements. The node can accordingly inform the terminal of the condition to initiate the connection re-establishment procedure (e.g., thresholds for the RSSI and/or channel occupancy measurements). When the measured RSSI is higher than a threshold, and/or the channel occupancy is higher than a threshold, the terminal can initiate the connection re-establishment procedure.
- As discussed above, during a handover and/or change of node operation, the terminal can maintain the source connection and the target connection at the same time. However, for the unlicensed spectrum, the connections can be unreliable due to the contention-based protocol and potential weak signals at the edge of the cell(s). Therefore, in some embodiments, the source node and the target node can coordinate a Time Division Multiplexing (TDM) pattern for the spectrum to reduce interference and delay—one node can avoid using the contention window reserved for the other node.
-
FIG. 12 shows a schematic diagram of a representative TMD pattern in accordance with the disclosed technology. Thesource node 1201 and thetarget node 1202 coordinate to obtain aTDM pattern 1211. In some embodiments, a node can pre-allocate uplink and/or downlink grant(s) for the terminal. The terminal can correspondingly transmit data using the pre-allocated grants. In some implementations, the pre-allocated grant(s) are allocated according to the TMD pattern to reduce interference and delay. As shown inFIG. 12 , theTDM pattern 1211 includes one or more preallocated grants 1213. Each grant includes a number of contiguous symbols or frames in the time domain. In some embodiments, a grant can be represented by a start time, a duration (e.g., a transmission window), and a periodicity. By including multiple time-domain symbols and/or frames, the transmission window enhances the probability that the terminal completes a successful transmission at a particular time-domain location. In some implementations, the preallocated grant(s) can be included the RRCConnectionReconfiguration message. - In some embodiments, the
source node 1201 and thetarget node 1202 can coordinate the TDM pattern for the preallocated uplink/downlink/downlink grant(s). First, thesource node 1201 can include configuration information for the preallocated uplink/downlink grant grant(s) of the source node in a handover request message. Thetarget node 1203 can include configuration information for the preallocated uplink/downlink grant(s) of the target node in a corresponding handover request acknowledge message. Thesource node 1201 and thetarget node 1203 may have different proallocated uplink/downlink grants, and can choose whether to modify the respective grant configuration(s) to reach an agreement. - Using the contention-based protocol (e.g., LBT), transmissions of Radio Link Monitoring (RLM) Reference Signals (RS) may fail. Such failures typically indicate a frequency overload. It is thus desirable for the terminal to discover the problem and recover the link in a timely manner.
-
FIG. 15 is a flowchart representation of amethod 1500 for wireless communication. Themethod 1500 includes, at 1502, monitoring, at a mobile device, a first number of failures of a network activity within a first evaluation period. Themethod 1500 includes, at 1504, determining, by the mobile device, based on the first number of failures of the network activity, a network problem caused by a network access using a contention-based protocol. Themethod 1500 includes, at 1506, initiating, by the mobile device, a procedure to recover from the network problem or to report the network problem. - For example, the terminal can evaluate or determine whether one or more RLM-RS are transmitted successfully from the node. The terminal can further determine how many RLM-RS are transmitted successfully from the node and/or how many RLM-RS fail to be transmitted successfully from the node.
- For example, the terminal can monitor RLM-RS transmissions in an evaluation period T1 using the LBT as the contention-based protocol. When the number of the RLM-RS that fail to be transmitted successfully in the evaluation period T1 is higher than a threshold, lower layers (e.g., Layer 1) of the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem. Alternatively, when the number of the RLM-RS that are transmitted successfully in the evaluation period T1 is lower than a threshold, lower layers (e.g., Layer 1) of the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem.
- In some implementations, the threshold can be either zero or all of the RLM-RS transmitted. For example, when none of RLM-RS are transmitted successfully in the evaluation period T1, lower layers (e.g., Layer 1) of the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem. When some of the RLM-RS are transmitted successfully (i.e., the number of RLM-RS that are transmitted successfully in the evaluation period T1 is greater than zero), lower layers (e.g., Layer 1) of the terminal do not send any indication to the RRC entity.
- The RRC entity can maintain a different evaluation period T3 (e.g., T3>T1). The entity can start a timer and detect an RLM-RS LBT problem after receiving N consecutive indications that there is an RLM-RS LBT problem from the lower layers within the evaluation period T3.
- In some embodiments, the terminal detects the RLM-RS LBT problems in the PCell, the terminal can leave the RRC_CONNECTED state if AS security has not been activated. In some implementations, the terminal can initiate the connection re-establishment procedure.
- In some embodiments, the terminal detects the RLM-RS LBT problems in the PSCell, the terminal can initiate the Secondary Cell Group (SCG) failure information procedure. In some implementations, the SCG failure information message can carry information such as the failureType (which can be set to the RLM-RS LBT detection failure), and measurement results with corresponding RSSI and channel occupancy for the inter-frequency.
- In some embodiments, the terminal can monitor RLM-RS transmissions in more than one evaluation periods.
- For example, the terminal can monitor RLM-RS transmissions in an evaluation period T1 using the LBT as the contention-based protocol. When the number of the RLM-RS that fail to be transmitted successfully in the evaluation period T1 is higher than a threshold, lower layers (e.g., Layer 1) of the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem. Alternatively, when the number of the RLM-RS that are transmitted successfully in the evaluation period T1 is lower than a threshold, lower layers (e.g., Layer 1) of the terminal can send an indication to the RRC entity indicating that there is an RLM-RS LBT problem.
- The terminal can use a second evaluation period T2. When the number of RLM-RS that fail to be transmitted successfully in the evaluation period T2 is lower than a threshold, lower layers (e.g., Layer 1) of the terminal send an indication to the RRC indicating an RLM-RS LBT recovery. Alternatively, when the number of the transmitted RLM-RS in the evaluation period T2 is higher than a threshold, lower layers (e.g., Layer 1) of the terminal sends an indication to the RRC indicating an RLM-RS LBT recovery.
- The RRC entity can maintain a different evaluation period T3 (e.g., T3>T1). The entity can start a timer and detect an RLM-RS LBT problem after receiving N1 consecutive indications that there is an RLM-RS LBT problem from the lower layers within the evaluation period T3.
- While the timer is running, the RRC entity can stop the timer upon receiving N2 consecutive indications indicating an RLM-RS LBT recovery from lower layers. The RRC entity then can determine that there is a recovery from the RLM-RS LBT problems.
- In some embodiments, the terminal detects RLM-RS LBT problems in the PCell, the terminal can leave the RRC_CONNECTED state if AS security has not been activated. In some implementations, the terminal can initiate the connection re-establishment procedure.
- In some embodiments, the terminal detects RLM-RS LBT problems in the PSCell, the terminal can initiate the Secondary Cell Group (SCG) failure information procedure. In some implementations, the SCG failure information message can carry information such as the failureType (which can be set to the RLM-RS LBT detection failure), and measurement results with corresponding RSSI and channel occupancy for the inter-frequency.
- Using the contention-based protocol (e.g., LBT), transmissions of Service Request (SR) or the random-access procedure (e.g., PRACH) may be blocked. If a SR transmission or a random-access procedure is blocked for many times, this indicates that there is a frequency overload and/or a delay of the transmission. It is thus desirable for the terminal to determine whether SR transmissions and/or random-access procedures are performed successfully.
- In some embodiments, when the number of SR LBT failures or the number of preamble LBT failures reaches a threshold, the MAC entity indicates a SR LBT problem or a preamble LBT problem to the RRC entity.
- In some embodiments, the terminal detects the SR LBT problems or the preamble LBT problems in the PCell, the terminal can leave the RRC_CONNECTED state if AS security has not been activated. In some implementations, the terminal can initiate the connection re-establishment procedure.
- In some embodiments, the terminal detects the SR LBT problems or the preamble LBT problems in the PSCell, the terminal can initiate the Secondary Cell Group (SCG) failure information procedure. In some implementations, the SCG failure information message can carry information such as the failureType (which can be set to the SR LBT failure or the preamble LBT failure), and measurement results with corresponding RSSI and channel occupancy for the inter-frequency.
-
FIG. 13 shows an example of awireless communication system 1300 where techniques in accordance with one or more embodiments of the present technology can be applied. Awireless communication system 1300 can include one or more base stations (BSs) 1305 a, 1305 b, one ormore wireless devices core network 1325. Abase station wireless devices base station - The
core network 1325 can communicate with one ormore base stations core network 1325 provides connectivity with other wireless communication systems and wired communication systems. The core network may include one or more service subscription databases to store information related to the subscribedwireless devices first base station 1305 a can provide wireless service based on a first radio access technology, whereas asecond base station 1305 b can provide wireless service based on a second radio access technology. Thebase stations wireless devices - In some implementations, a wireless communication system can include multiple networks using different wireless technologies. A dual-mode or multi-mode wireless device includes two or more wireless technologies that could be used to connect to different wireless networks.
-
FIG. 14 is a block diagram representation of a portion of a radio station. Aradio station 1405 such as a base station or a wireless device (or UE) can includeprocessor electronics 1410 such as a microprocessor that implements one or more of the wireless techniques presented in this document. Theradio station 1405 can includetransceiver electronics 1415 to send and/or receive wireless signals over one or more communication interfaces such asantenna 1420. Theradio station 1405 can include other communication interfaces for transmitting and receiving data.Radio station 1405 can include one or more memories (not explicitly shown) configured to store information such as data and/or instructions. In some implementations, theprocessor electronics 1410 can include at least a portion of thetransceiver electronics 1415. In some embodiments, at least some of the disclosed techniques, modules or functions are implemented using theradio station 1405. - It is thus evident that methods and corresponding apparatus relating to efficient transmissions using the unlicensed spectrum are disclosed. The disclosed techniques can be used in various embodiments to reduce transmission delay and interference caused by a contention-based protocol for medium access, and to increase the reliability of the transmissions.
- In one representative aspect, a method for wireless communication is disclosed. The method includes receiving, at a wireless communication node, a first message from a mobile device requesting a reestablishment of a network connection; transmitting, from the wireless communication node, a second message to the mobile device, the second message including information for reestablishing and reconfiguring the network connection; and receiving, at the wireless communication node, a third message from the mobile device acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- In some embodiments, the reestablishment of the network connection is achieved using less than five message transmissions between the wireless communication node and the mobile device. In some embodiments, the information for reconfiguring the network connection is carried in a protocol data unit produced by a Packet Data Convergence Protocol entity. In some embodiments, the information for reconfiguring the network connection is carried by a protocol data unit packet or an octet string included in the second message.
- In another representative aspect, a method for wireless communication is disclosed. The method includes transmitting, from a mobile device, a first message to a wireless communication node requesting a reestablishment of a network connection; receiving, at the mobile device, a second message from the wireless communication node, the second message including information for reestablishing and reconfiguring the network connection; and transmitting, from the mobile device, a third message to the wireless communication node acknowledging at least one of (1) completing a reestablishment of the network connection, or (2) completing a reconfiguration of the network connection.
- In some embodiments, the reestablishment of the network connection is achieved using less than five message transmissions between the wireless communication node and the mobile device. In some embodiments, the information for reconfiguring the network connection is carried in a protocol data unit produced by a Packet Data Convergence Protocol entity. In some embodiments, the information for reconfiguring the network connection is carried by a protocol data unit packet or an octet string included in the second message.
- In another representative aspect, a method for wireless communication includes transmitting, from a first wireless communication node over a first transmission link, a set of data packets to a mobile device during a handover or a change of node operation; and transmitting, from the first wireless communication node over a second transmission link, at least a subset of the set of data packets to a second wireless communication node during the handover or the change of node operation to cause the second wireless communication to send at least the subset of the set of data packets to the mobile device over a third transmission link.
- In some embodiments, the subset of the set of data packets transmitted over the second transmission link is not acknowledged by the mobile device. In some implementations, the subset of the set of data packets is duplicated by a packet data convergence protocol entity of the first wireless communication node with a sequence number of the first wireless communication node prior to a head compression of the subset of the set of data packets.
- In some embodiments, the method includes transmitting, from the first wireless communication node over the second transmission link, a message to the second wireless communication node during the handover or the change of node operation, the message including information of a second subset of the set of data packets that is acknowledged by the mobile device.
- In some embodiments, the method includes configuring the handover or the change of node operation by: transmitting, from the first wireless communication node, a first message to the second wireless communication node requesting a handover or a change of node operation from the first wireless communication node to the second wireless communication node, wherein the first message includes information for configuring a first set of transmission grants according to a first time-domain multiplexing pattern; receiving, at the first wireless communication node, a second message from the second wireless communication node acknowledging the hand over or the change of node operation, wherein the second message includes information for configuring a second set of transmission grants according to a second time-domain multiplexing pattern; and determining, based on the first and second time-domain multiplexing patterns, a third set of transmission grants according to a third time-domain multiplex pattern.
- In some embodiments, each set of the first, second, and third sets transmission grants is organized according to a time division multiplexing pattern. In some implementations, each grant in the time division multiplexing pattern is represented by at least one of the following: a start time, a transmission window, or a periodicity of the grant.
- In some embodiments, the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine when to initiate the handover or the change of node operation. In some implementations, the information includes at least one of: a threshold value for a Received Strength Signal Indicator, or a threshold value for a Channel Occupancy.
- In some embodiments, the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine whether the mobile device is located at an edge of a cell provided by the first wireless communication node. In some implementations, the information includes at least a threshold value for a Reference Signal Received Power measurement.
- In another representative aspect, a method for wireless communication includes receiving, at a mobile device, a set of data packets from a first wireless communication node over a first wireless link during a handover operation or a change of node operation; receiving, at the mobile device, at least a subset of the set of data packets from a second wireless communication node over a second wireless link during the handover operation or the change of node; and decoding the data packets based on the set of data packets from the first wireless communication node and at least the subset of the set of data packets from the second wireless communication node.
- In some embodiments, the method includes performing duplication detection based on the set of data packets from the first wireless communication node and the subset of the set of data packets from the second wireless communication node.
- In some embodiments, the method includes receiving, at the mobile device, information from the first wireless communication node for determining when to initiate the handover operation or the change of node operation. In some implementations, the information includes at least one of: a threshold value for a Received Strength Signal Indicator, or a threshold value for a Channel Occupancy.
- In some embodiments, the method includes receiving, at the mobile device, information from the first wireless communication node for determining whether the mobile device is located at an edge of a cell provided by the first wireless communication node. In some implementations, the information includes at least a threshold value for a Reference Signal Received Power measurement.
- In another representative aspect, a method for wireless communication includes transmitting, from a mobile device, a set of data packets to a first wireless communication node during a handover operation or a change of node; and transmitting, from the mobile device, at least a subset of the set of the data packets to a second wireless communication node during the handover operation or the change of node operation for assisting the first wireless communication node to decode the data packets.
- In some embodiments, the subset of the set of data packets is not acknowledged by the first wireless communication node. In some implementations, the subset of the set of data packets is duplicated by a packet data convergence protocol entity with a sequence number of the mobile device prior to a header compression of the subset of the set of data packets.
- In some embodiments, the method includes receiving, at the mobile device, information for assisting the mobile device to determine when to initiate the handover or the change of node operation from the first wireless communication node. In some embodiments, the method includes receiving, at the mobile device, information from the first wireless communication node for assisting the mobile device to determine whether the mobile device is located at an edge of a cell provided by the first wireless communication node.
- In another representative aspect, a method for wireless communication includes receiving, at a first wireless communication node, a set of data packets from a mobile device during a handover operation or a change of node operation; receiving, at the first wireless communication node over a second transmission link, at least a subset of the set of data packets from the second wireless communication node; and decoding, by the first wireless communication node, the data packets based on the set of the data packets from the mobile device and at least the subset of the set of data packets from the second wireless communication node.
- In some embodiments, the method includes receiving, at the first wireless communication node, a message from the second wireless communication node, the message including information of at least the subset of the set of data packets received at the second wireless communication node. In some embodiments, the method includes performing, at the first wireless communication node, duplication detection based on the set of data packets from the mobile device and the subset of the set of data packets from the second wireless communication node.
- In some embodiments, the method includes configuring the handover or the change of node operation by: transmitting, from the first wireless communication node, a first message to the second wireless communication node requesting a handover or a change of node operation from the first wireless communication node to the second wireless communication node, wherein the first message includes information for configuring a first set of transmission grants according to a first time-domain multiplexing pattern; receiving, at the first wireless communication node, a second message from the second wireless communication node acknowledging the hand over or the change of node operation, wherein the second message includes information for configuring a second set of transmission grants according to a second time-domain multiplexing pattern; and determining, based on the first and second time-domain multiplexing patterns, a third set of transmission grants according to a third time-domain multiplex pattern.
- In some embodiments, each set of the first, second, and third sets transmission grants is organized according to a time division multiplexing pattern. In some implementations, each grant in the time division multiplexing pattern is represented by at least one of the following: a start time, a transmission window, or a periodicity of the grant.
- In some embodiments, the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine when to initiate the handover or the change of node operation. In some implementations, the information includes at least one of: a threshold value for a Received Strength Signal Indicator, or a threshold value for a Channel Occupancy.
- In some embodiments, the method includes transmitting, from the first wireless communication node, information for assisting the mobile device to determine whether the mobile device is located at an edge of a cell provided by the first wireless communication node. In some implementations, the information includes at least a threshold value for a Reference Signal Received Power measurement.
- In another representative aspect, a method for wireless communication includes monitoring, at a mobile device, a number of failures of a network activity within a first evaluation period; determining, by the mobile device, based on the number of failures of the network activity, a network problem has occurred, the network problem caused by a network access using a contention-based protocol; and initiating, by the mobile device, a procedure to recover from the network problem or to report the network problem.
- In some embodiments, determining the network problem comprises comparing the number of failures of the network activity to a threshold. In some embodiments, the method includes monitoring, at the mobile device, the second number of failures of the network activity within a second evaluation period; and determining, by the mobile device, based on the first and second numbers of failures of the network activity, a recovery from the network problem has occurred.
- In some embodiments, the network activity includes at least one of the following: a Radio Link Monitoring Reference Signal transmission, a Service Request transmission, or a random-access procedure. In some embodiments, the method includes determining, by the mobile device, that the network problem happens in a primary cell provided by a network, wherein the procedure to recover from the network problem or to report the network problem includes a Radio Resource Control reestablishment procedure. In some embodiments, the method includes determining, by the mobile device, that the network problem happens in a primary secondary cell provided by a network, wherein the procedure to recover from the network problem or to report the network problem includes a Secondary Cell Group failure information procedure.
- From the foregoing, it will be appreciated that specific embodiments of the presently disclosed technology have been described herein for purposes of illustration, but that various modifications may be made without deviating from the scope of the invention. Accordingly, the presently disclosed technology is not limited except as by the appended claims.
- The disclosed and other embodiments, modules and the functional operations described in this document can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this document and their structural equivalents, or in combinations of one or more of them. The disclosed and other embodiments can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus. The computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more them. The term “data processing apparatus” encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them. A propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode information for transmission to suitable receiver apparatus.
- A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- The processes and logic flows described in this document can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
- Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random-access memory or both. The essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. However, a computer need not have such devices. Computer readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
- While this patent document contains many specifics, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular inventions. Certain features that are described in this patent document in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
- Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. Moreover, the separation of various system components in the embodiments described in this patent document should not be understood as requiring such separation in all embodiments.
- Only a few implementations and examples are described and other implementations, enhancements and variations can be made based on what is described and illustrated in this patent document.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/327,760 US20230309176A1 (en) | 2018-04-20 | 2023-06-01 | Apparatus and method for mobility management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/083890 WO2019200603A1 (en) | 2018-04-20 | 2018-04-20 | Apparatus and method for mobility management |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/083890 Continuation WO2019200603A1 (en) | 2018-04-20 | 2018-04-20 | Apparatus and method for mobility management |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/327,760 Continuation US20230309176A1 (en) | 2018-04-20 | 2023-06-01 | Apparatus and method for mobility management |
Publications (2)
Publication Number | Publication Date |
---|---|
US20210037591A1 true US20210037591A1 (en) | 2021-02-04 |
US11700662B2 US11700662B2 (en) | 2023-07-11 |
Family
ID=68239356
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/075,048 Active 2038-05-01 US11700662B2 (en) | 2018-04-20 | 2020-10-20 | Apparatus and method for mobility management |
US18/327,760 Pending US20230309176A1 (en) | 2018-04-20 | 2023-06-01 | Apparatus and method for mobility management |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/327,760 Pending US20230309176A1 (en) | 2018-04-20 | 2023-06-01 | Apparatus and method for mobility management |
Country Status (4)
Country | Link |
---|---|
US (2) | US11700662B2 (en) |
EP (1) | EP3782434B1 (en) |
CN (2) | CN111869315A (en) |
WO (1) | WO2019200603A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200396619A1 (en) * | 2018-05-04 | 2020-12-17 | Lg Electronics Inc. | Method and apparatus for enhancing measurement rule on unlicensed frequency in wireless communication system |
US20210037547A1 (en) * | 2019-07-30 | 2021-02-04 | Qualcomm Incorporated | Time-division multiplexing of uplink communications during make-before-break handover |
US20210105644A1 (en) * | 2018-06-15 | 2021-04-08 | Vivo Mobile Communication Co.,Ltd. | Method for determining radio link state and terminal |
US20210345200A1 (en) * | 2020-04-22 | 2021-11-04 | Samsung Electronics Co., Ltd. | Method and device for handling lbt failure indicator when daps handover is configured in wireless communication system |
US11246069B2 (en) * | 2018-11-01 | 2022-02-08 | Qualcomm Incorporated | Single transmit sharing during handover and dual connectivity operations |
US11405813B2 (en) * | 2019-08-16 | 2022-08-02 | Mediatek Inc. | Radio link monitoring (RLM) procedures in new radio unlicensed bands (NR-U) |
WO2024049410A1 (en) * | 2022-08-30 | 2024-03-07 | Rakuten Mobile, Inc. | System and method for selective handover on a mobile network |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7385856B2 (en) * | 2020-09-24 | 2023-11-24 | オフィノ, エルエルシー | Release message in small data transmission procedure |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100111065A1 (en) * | 2008-10-30 | 2010-05-06 | Lg Electronics Inc. | Method for transmitting downlink reference signals in a multi-antenna wireless communication system |
CN103583064A (en) * | 2011-04-01 | 2014-02-12 | 株式会社泛泰 | Handover apparatus and method for avoiding in-device coexistence interference |
US20140295820A1 (en) * | 2011-10-27 | 2014-10-02 | Samsung Electronics Co., Ltd | Method and apparatus for effectively reducing power consumption of terminal in mobile communication system |
US20140334371A1 (en) * | 2012-01-27 | 2014-11-13 | Samsung Electronics Co., Ltd. | Method and apparatus for transmitting and receiving data by using plurality of carriers in mobile communication systems |
US20150341835A1 (en) * | 2013-04-03 | 2015-11-26 | Blackberry Limited | Methods and Systems for Wireless Communication in Heterogeneous Networks |
US20170006520A1 (en) * | 2014-03-14 | 2017-01-05 | Huawei Technologies Co., Ltd. | Handover method, terminal, base station, and system |
EP3148251B1 (en) * | 2014-06-17 | 2018-11-07 | Huawei Technologies Co. Ltd. | Data transmission method and device |
US20180368200A1 (en) * | 2017-06-16 | 2018-12-20 | Samsung Electronics Co., Ltd | Method and apparatus for processing packet in next-generation mobile communication system |
US20190116536A1 (en) * | 2016-04-01 | 2019-04-18 | Samsung Electronics Co., Ltd | Method and enb equipment for supporting seamless handover |
US20190124572A1 (en) * | 2017-10-20 | 2019-04-25 | Comcast Cable Communications, Llc | Non-Access Stratum Capability Information |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DK2178355T3 (en) | 2007-07-24 | 2011-08-15 | So Generation B V | Pot assembly |
WO2009019789A1 (en) * | 2007-08-09 | 2009-02-12 | Fujitsu Limited | Handover method in radio communication system, radio base station, and radio terminal |
US20090175163A1 (en) * | 2008-01-04 | 2009-07-09 | Interdigital Patent Holdings, Inc. | Method and apparatus of performing packet data convergence protocol re-establishment |
CN101772010B (en) * | 2008-12-30 | 2012-09-05 | 联芯科技有限公司 | Abnormal processing method for terminal and network for packet switching service district refreshment |
US8331322B2 (en) * | 2009-01-22 | 2012-12-11 | Htc Corporation | Method of handling radio bearer resumption, wireless communication device and wireless communication system thereof |
WO2011079210A1 (en) * | 2009-12-23 | 2011-06-30 | Interdigital Patent Holdings, Inc. | Ferforming measurements in wireless communications using multiple carriers |
CN102123517A (en) * | 2010-01-11 | 2011-07-13 | ***通信集团公司 | Method and device for reestablishing radio resource control (RRC) connection |
CN102158899B (en) * | 2010-02-12 | 2015-01-07 | 华为技术有限公司 | Data forwarding method in relay network, device and system |
US9042315B2 (en) * | 2011-05-03 | 2015-05-26 | Mediatek Inc. | SCELL radio link monitoring and radio link failure handling |
US8958422B2 (en) * | 2012-03-17 | 2015-02-17 | Blackberry Limited | Handling packet data convergence protocol data units |
JP6375384B2 (en) * | 2013-10-30 | 2018-08-15 | インターデイジタル パテント ホールディングス インコーポレイテッド | Connectivity robustness in wireless systems |
US9877256B2 (en) * | 2014-03-24 | 2018-01-23 | Intel IP Corporation | Systems, devices, and methods for interworking between a universal mobile telecommunications system (UMTS) network and a wireless local area network (WLAN) |
US10009925B2 (en) * | 2014-10-03 | 2018-06-26 | Qualcomm Incorporated | Physical layer procedures for LTE in unlicensed spectrum |
CN107113895B (en) | 2015-08-04 | 2020-10-09 | 华为技术有限公司 | Communication method, network side equipment and user equipment |
CN109691155B (en) * | 2016-08-09 | 2023-05-30 | 三星电子株式会社 | Method and apparatus for managing user plane operations in a wireless communication system |
US10750410B2 (en) * | 2016-09-30 | 2020-08-18 | Huawei Technologies Co., Ltd. | Ultra reliable low latency connection support in radio access networks |
US11382018B2 (en) * | 2017-07-27 | 2022-07-05 | T-Mobile Usa, Inc. | Wireless handovers based on device movement |
WO2019216730A1 (en) * | 2018-05-11 | 2019-11-14 | Lg Electronics Inc. | Method and apparatus for resuming only signaling radio bearers in wireless communication system |
-
2018
- 2018-04-20 EP EP18915374.5A patent/EP3782434B1/en active Active
- 2018-04-20 CN CN201880091059.2A patent/CN111869315A/en active Pending
- 2018-04-20 CN CN202310478624.3A patent/CN117295187A/en active Pending
- 2018-04-20 WO PCT/CN2018/083890 patent/WO2019200603A1/en unknown
-
2020
- 2020-10-20 US US17/075,048 patent/US11700662B2/en active Active
-
2023
- 2023-06-01 US US18/327,760 patent/US20230309176A1/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100111065A1 (en) * | 2008-10-30 | 2010-05-06 | Lg Electronics Inc. | Method for transmitting downlink reference signals in a multi-antenna wireless communication system |
CN103583064A (en) * | 2011-04-01 | 2014-02-12 | 株式会社泛泰 | Handover apparatus and method for avoiding in-device coexistence interference |
US20140295820A1 (en) * | 2011-10-27 | 2014-10-02 | Samsung Electronics Co., Ltd | Method and apparatus for effectively reducing power consumption of terminal in mobile communication system |
US20140334371A1 (en) * | 2012-01-27 | 2014-11-13 | Samsung Electronics Co., Ltd. | Method and apparatus for transmitting and receiving data by using plurality of carriers in mobile communication systems |
US20150341835A1 (en) * | 2013-04-03 | 2015-11-26 | Blackberry Limited | Methods and Systems for Wireless Communication in Heterogeneous Networks |
US20170006520A1 (en) * | 2014-03-14 | 2017-01-05 | Huawei Technologies Co., Ltd. | Handover method, terminal, base station, and system |
EP3148251B1 (en) * | 2014-06-17 | 2018-11-07 | Huawei Technologies Co. Ltd. | Data transmission method and device |
US20190116536A1 (en) * | 2016-04-01 | 2019-04-18 | Samsung Electronics Co., Ltd | Method and enb equipment for supporting seamless handover |
US20180368200A1 (en) * | 2017-06-16 | 2018-12-20 | Samsung Electronics Co., Ltd | Method and apparatus for processing packet in next-generation mobile communication system |
US20190124572A1 (en) * | 2017-10-20 | 2019-04-25 | Comcast Cable Communications, Llc | Non-Access Stratum Capability Information |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200396619A1 (en) * | 2018-05-04 | 2020-12-17 | Lg Electronics Inc. | Method and apparatus for enhancing measurement rule on unlicensed frequency in wireless communication system |
US20210105644A1 (en) * | 2018-06-15 | 2021-04-08 | Vivo Mobile Communication Co.,Ltd. | Method for determining radio link state and terminal |
US11246069B2 (en) * | 2018-11-01 | 2022-02-08 | Qualcomm Incorporated | Single transmit sharing during handover and dual connectivity operations |
US20210037547A1 (en) * | 2019-07-30 | 2021-02-04 | Qualcomm Incorporated | Time-division multiplexing of uplink communications during make-before-break handover |
US11895694B2 (en) * | 2019-07-30 | 2024-02-06 | Qualcomm Incorporated | Time-division multiplexing of uplink communications during make-before-break handover |
US11405813B2 (en) * | 2019-08-16 | 2022-08-02 | Mediatek Inc. | Radio link monitoring (RLM) procedures in new radio unlicensed bands (NR-U) |
US20210345200A1 (en) * | 2020-04-22 | 2021-11-04 | Samsung Electronics Co., Ltd. | Method and device for handling lbt failure indicator when daps handover is configured in wireless communication system |
US11683733B2 (en) * | 2020-04-22 | 2023-06-20 | Samsung Electronics Co., Ltd. | Method and device for handling LBT failure indicator when DAPS handover is configured in wireless communication system |
WO2024049410A1 (en) * | 2022-08-30 | 2024-03-07 | Rakuten Mobile, Inc. | System and method for selective handover on a mobile network |
Also Published As
Publication number | Publication date |
---|---|
WO2019200603A1 (en) | 2019-10-24 |
CN111869315A (en) | 2020-10-30 |
EP3782434A1 (en) | 2021-02-24 |
CN117295187A (en) | 2023-12-26 |
EP3782434A4 (en) | 2021-12-08 |
US11700662B2 (en) | 2023-07-11 |
US20230309176A1 (en) | 2023-09-28 |
EP3782434B1 (en) | 2023-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11700662B2 (en) | Apparatus and method for mobility management | |
EP3607770B1 (en) | Methods for reporting a secondary node failure in dual connectivity networks, user equipment and base station | |
JP6937844B2 (en) | Packet replication in a Packet Data Convergence Protocol (PDCP) entity | |
WO2018171759A1 (en) | Information transmission method and apparatus | |
TWI828850B (en) | Techniques for communicating mobility information | |
TWI735043B (en) | Electronic device and method for beam failure recovery | |
US11006342B2 (en) | Handover techniques in wireless communications | |
JP2022550371A (en) | Communication channel failure detection and recovery | |
JP2021520658A (en) | User equipment, network nodes and methods in wireless communication networks | |
CN113748709A (en) | Conditional Handover (CHO) deconfiguration and failure handling in wireless communications | |
US10667192B1 (en) | Handover techniques in wireless communications | |
JP2013544474A (en) | Method for reporting radio link failure information, terminal equipment and base station | |
US20190215899A1 (en) | Releasing signaling radio bearers for cell groups | |
US20220225191A1 (en) | Wireless communication method for mobility control | |
JP7511580B2 (en) | Support for selection of random access type by user equipment | |
EP4062663A1 (en) | Dynamically controlling a power state of a mobile integrated access and backhaul node | |
EP4364462A1 (en) | Reporting for conditional primary secondary cell addition or change | |
US20220095192A1 (en) | Techniques for signalling, e.g., for new radio unlicensed (nr-u) | |
JP2024516694A (en) | Capability signaling for quality of experience measurements | |
TW201831023A (en) | Mobility-aware contention procedures on a shared communication medium | |
CN117561684A (en) | Apparatus and method for enhancing multi-beam operation in a wireless network | |
CN114557111A (en) | User equipment and scheduling node | |
RU2787775C1 (en) | Wireless communication method for mobility management | |
US11991575B2 (en) | Handover procedures involving sidelink communications | |
TW202418872A (en) | Techniques for communicating mobility information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ZTE CORPORATION, CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NIU, LI;ZHAO, YAJUN;REEL/FRAME:054110/0007 Effective date: 20200715 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |